Cyberwar Not Same as Cybercrime, Schmidt Says

White House cybersecurity coordinator Howard Schmidt said that policymakers and others should stop "conflating... cyberwar with cyber-espionage with cybercrime." Resolving online criminality like identity theft should be treated differently than protecting the electric grid from sabotage by foreign powers or online espionage, but war-like rhetoric may threaten the U.S.'s ability to deal with any of these issues effectively, he warned.

Companies Urge New Internet Piracy Legislation

More than 130 companies, business groups and others signed a letter to members of Congress urging lawmakers to move legislation that would give law enforcement more tools to crack down on websites that offer pirated content and counterfeit products. "Legislation to disrupt these efforts is a major step to make the Internet safer and protect consumers from the dangers of buying in the online marketplace," according to the letter signed by such groups and companies as the Association of American Publishers, Ford Motor Co., the Motion Picture Association of America, Reed Elsevier, the Recording Industry Association of America and the U.S. Chamber of Commerce.

Clinton Announces U.S. Policy on Internet Freedom

Days after Facebook and Twitter added fuel to a revolt in Egypt, the Obama administration announced a new policy on Internet freedom, intended to help people get around barriers in cyberspace while making it harder for autocratic governments to use the same technology to repress dissent. "The United States continues to help people in oppressive Internet environments get around filters, stay one step ahead of the censors, the hackers and the thugs who beat them up or imprison them for what they say online," said Secretary of State Hillary Rodham Clinton, laying out the policy in a speech at George Washington University.

"Anonymous" Hackers Release New Version of Worm

The group of anonymous "hacktivists" that made headlines for online cyberattacks in December just released a bombshell online: a decrypted version of the same cyberworm that crippled Iran's nuclear power program. The ones and zeroes that make up the code called the Stuxnet worm -- described as the most sophisticated cyberweapon ever created -- were reportedly found when the faceless group hacked into the computers of HBGary, a U.S. security company that the anonymous collective viewed as an enemy.

Google Accused of Stealing "Click to Call" Trade Secrets

Technology communications company VoIP Inc. sued Google Inc. in New York Supreme Court, accusing the Internet giant of stealing its trade secrets related to online voice technology. The litigation stems from a September 2005 contract in which, according to the complaint, VoIP's Los Angeles-based subsidiary, VoiceOne Communications Corp, agreed to provide Google with its patented "Click to Call" technology that allows Internet users to place a call to advertisers or merchants simply by clicking a link on a website.

U.S. Condemns Blogger's "Secret Trial" in Syria

The United States condemned what it said was Syria's "secret trial" of a young blogger and called for her immediate release, saying allegations of U.S. espionage connections were baseless. "The United States strongly condemns Syria's secret trial of blogger Tal al-Molouhi," State Department spokesman P.J. Crowley said in a statement, saying baseless allegations of U.S. connections had resulted "in a spurious accusation of espionage."

Chinese Technician Denies Hacking Energy Companies

A Chinese technician identified by U.S. Internet security company McAfee Inc. as a conduit to the alleged hacking of the computer files of major energy companies denied all knowledge of the case. "What? You sure it's my company?" Song Zhiyue, a technician for website hosting company Science & Technology Internet in northeastern Shandong province, said by telephone.

Iranian Facilities Targeted by Stuxnet Computer Worm

The Stuxnet software worm repeatedly sought to infect five industrial facilities in Iran over a 10-month period, a new report says, in what could be a clue into how it might have infected the Iranian uranium enrichment complex at Natanz. The report, released by Symantec, a computer security software firm, said there were three waves of attacks.

MPEG Group Looking at Patents Used by Google

A serious complication has just emerged for Google's plan for high-quality, patent-free, open-source video on the Web -- but Google also revealed plans to try to counteract it. MPEG LA, an organization that licenses video-related patents related to a variety of standards, has formally requested for patent owners to inform them of patents they believe Google's VP8 technology uses.

Lawmaker Introduces Online Privacy Bill Again

Rep. Bobby Rush, D-Ill., reintroduced his legislation from the last Congress aimed at enhancing consumer privacy online. The bill appears to be similar to the legislation he offered in the last Congress that would allow for the collection and use of information from consumers but require firms to provide consumers with the ability to opt out from such collection.

Obama Pushes to Expand Wireless Internet Access

Declaring that "we can't expect tomorrow's economy to take root using yesterday's infrastructure," President Obama made the case that expanding wireless access is critical to the nation’s economic recovery. "This isn't just about a faster Internet or being able to find a friend on Facebook," Mr. Obama said in a speech at Northern Michigan University, after viewing a demonstration on long-distance learning over the Internet.

Chinese Hackers Target Oil, Energy Industry, McAfee Says

For years, companies in the oil and energy industry have been the victims of attempts to steal e-mail and other sensitive information from hackers believed to be in China, according to a new report from McAfee. The attacks, to which McAfee gave the sinister name "Night Dragon," penetrated company networks through Web servers, compromised desktop computers, bypassed safeguards by misusing administrative credentials, and used remote administration tools to obtain the information, the security firm said.